Compliance

10 pts.
Tags:
Compliance
IT security
Within the GRC cycle, how can IT security compliance be best described?

Answer Wiki

Thanks. We'll let you know when a new response is added.

How about:

IT taking steps to keep the business out of hot water with the industry and government regulators up to the point where a breach occurs and it’s revealed that vulnerabilities and risks were overlooked the environment was not as secure as it was assumed to be.

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Michael Tidmarsh
    Welcome to ITKE gbwilson! Could you go into a little more detail on your issue? What is a GRC cycle? Any more information you could give could help our experts answer your question.

    To see more on how our community works, check out our FAQ.
    33,080 pointsBadges:
    report
  • TomLiotta
    "Best" answer depends on what class the question is for. A business management class will look for an answer different from a pen-test class for example. Can you clarify? -- Tom
    125,585 pointsBadges:
    report
  • jezz341
    IT security Compliance? Each companies I believe have their own standards(internal/international). You need to meet the items with those standards so would meet the companies compliance state. Example lets say PCI DSS usually used for Banks . Guest OS for windows should be disable.. you need to follow this so you'll meet the standard.
    195 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following